{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T07:43:15Z","timestamp":1769499795635,"version":"3.49.0"},"reference-count":42,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2013,11,25]],"date-time":"2013-11-25T00:00:00Z","timestamp":1385337600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11,25]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 This paper aims to map out multi-agency partnerships in the UK information assurance (UKIA) network in the UK. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 The paper surveyed members of the UKIA community and achieved a 52 percent response rate (<jats:italic>n<\/jats:italic>=104). The paper used a multi-dimensional scaling (MDS) technique to map the multi-agency cooperation space and factor analysis and ordinary least squares regression to identify predictive factors of cooperation frequency. Qualitative data were also solicited via the survey and interviews with security managers. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 Via the quantitative measures, the paper locates gaps in the multi-agency cooperation network and identifies predictors of cooperation. The data indicate an over-crowded cybersecurity space, problems in apprehending perpetrators, and poor business case justifications for SMEs as potential inhibitors to cooperation, while concern over certain cybercrimes and perceptions of organisational effectiveness were identified as motivators. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title>\n               <jats:p> \u2013 The data suggest that the neo-liberal rationality that has been evoked in other areas of crime control is also evident in the control of cybercrimes. The paper concludes divisions exist between the High Policing rhetoric of the UK's Cyber Security Strategy and the (relatively) Low Policing cooperation outcomes in \u201con the ground\u201d cyber-policing. If the cooperation outcomes advocated by the UK Cyber Security Strategy are to be realised, UKIA organisations must begin to acknowledge and remedy gaps and barriers in cooperation. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This paper provides the first mixed-methods evidence on the multi-agency cooperation patterns amongst the UKIA community in the UK and highlights significant gaps in the network.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/imcs-04-2013-0027","type":"journal-article","created":{"date-parts":[[2013,10,24]],"date-time":"2013-10-24T05:06:56Z","timestamp":1382591216000},"page":"420-443","source":"Crossref","is-referenced-by-count":31,"title":["Multi-agency partnerships in cybercrime reduction"],"prefix":"10.1108","volume":"21","author":[{"given":"Michael","family":"Levi","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Leighton Williams","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022030920451741000_b1","unstructured":"Andersson, J.J.\n                and \n                  Malm, A.\n                (2007), \u201cPublic-private partnerships and the challenge of critical infrastructure protection\u201d, in \n                  Wigert, I.A.\n                and \n                  Dunn, M.\n                (Eds), International CIIP Handbook, ETH, Zurich."},{"key":"key2022030920451741000_b2","unstructured":"Butler, J.B.\n                and \n                  Lachow, I.\n                (2012), Multilateral Approaches for Improving Global Security in Cyberspace, The MITRE Corporation, Washington, VA."},{"key":"key2022030920451741000_b3","unstructured":"Cabinet Office\n                (2011), The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World, Cabinet Office, London."},{"key":"key2022030920451741000_b4","unstructured":"Cabinet Office\n                (2012), The UK Cyber Security Strategy: Report on Progress \u2013 December 2012, Cabinet Office, London."},{"key":"key2022030920451741000_b45","unstructured":"Cohen, J.\n                (1988), Statistical Power Analysis for the Behavioral Sciences, Academic Press, New York, NY."},{"key":"key2022030920451741000_b5","unstructured":"Coxon, A.P.M.\n                (1982), The User's Guide to Multidimensional Scaling, Heinemann Educational Books Ltd, London."},{"key":"key2022030920451741000_b6","unstructured":"Crawford, A.\n                (1997), The Local Governance of Crime: Appeals to Community and Partnerships, Clarendon Press, Oxford."},{"key":"key2022030920451741000_b7","unstructured":"Crawford, A.\n                (2002), \u201cThe governance of crime and insecurity in an anxious age: the trans-European and the local\u201d, in \n                  Crawford, A.\n                (Ed.), Crime and Insecurity, Willan, Cullompton, pp. 27-51."},{"key":"key2022030920451741000_b46","unstructured":"Crime and Disorder Act\n                  \n                (1998), HMSO, London."},{"key":"key2022030920451741000_b8","doi-asserted-by":"crossref","unstructured":"Doig, A.\n                and \n                  Levi, M.\n                (2009), \u201cInter-agency work and the UK public sector investigation of fraud, 1996-2006: joined up rhetoric and disjointed reality\u201d, Policing and Society, Vol. 19 No. 3, pp. 199-215.","DOI":"10.1080\/10439460902863311"},{"key":"key2022030920451741000_b9","doi-asserted-by":"crossref","unstructured":"Dorofeev, S.\n                and \n                  Grant, P.\n                (2006), Statistics for Real-Life Sample Surveys: Non-simple Random Samples and Weighted Data, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511543265"},{"key":"key2022030920451741000_b10","doi-asserted-by":"crossref","unstructured":"Dunn-Cavelty, M.\n                and \n                  Suter, M.\n                (2009), \u201cPublic-private partnerships are no silver bullet: an expanded governance model for critical infrastructure protection\u201d, International Journal of Critical Infrastructure Protection, Vol. 2 No. 4, pp. 179-187.","DOI":"10.1016\/j.ijcip.2009.08.006"},{"key":"key2022030920451741000_b11","doi-asserted-by":"crossref","unstructured":"Dupont, B.\n                (2004), \u201cSecurity in the age of networks\u201d, Policing & Society, Vol. 14 No. 1, pp. 76-91.","DOI":"10.1080\/1043946042000181575"},{"key":"key2022030920451741000_b12","unstructured":"Edwards, A.\n                and \n                  Hughes, G.\n                (2009), \u201cThe preventive turn and the promotion of safer communities in England and Wales\u201d, in \n                  Crawford, A.\n                (Ed.), Crime Prevention Policies in Comparative Perspective, Willan, Cullompton, pp. 62-85."},{"key":"key2022030920451741000_b13","doi-asserted-by":"crossref","unstructured":"Efron, B.\n                and \n                  Tibshirani, R.\n                (1993), An Introduction to the Bootstrap, Chapman & Hall, London.","DOI":"10.1007\/978-1-4899-4541-9"},{"key":"key2022030920451741000_b15","unstructured":"Garland, D.\n                (2001), The Culture of Control, Oxford University Press, Oxford."},{"key":"key2022030920451741000_b16","unstructured":"Gilling, D.\n                (2007), Crime Reduction and Community Safety: Labour and the Politics of Local Crime Control, Willan, Cullompton."},{"key":"key2022030920451741000_b17","unstructured":"Home Office\n                (2010), Policing in the 21st Century: Reconnecting Police and the People, Cm 7925, Home Office, London."},{"key":"key2022030920451741000_b18","doi-asserted-by":"crossref","unstructured":"Huey, L.\n               , \n                  Nhan, J.\n                and \n                  Broll, R.\n                (2012), \u201c\u2018Uppity civilians\u2019 and \u2018cyber-vigilantes\u2019: the role of the general public in policing cybercrime\u201d, Criminology and Criminal Justice, Vol. 13 No. 1, pp. 81-97.","DOI":"10.1177\/1748895812448086"},{"key":"key2022030920451741000_b19","doi-asserted-by":"crossref","unstructured":"Hughes, G.\n                (2007), The Politics of Crime and Community, Palgrave Macmillan, London.","DOI":"10.1007\/978-0-230-21411-8"},{"key":"key2022030920451741000_b20","doi-asserted-by":"crossref","unstructured":"Irion, K.\n                (2012), \u201cThe governance of network and information security in the European Union: the European public-private partnership for resilience (EP3R)\u201d, paper presented at 27th European Communication Policy Research Conference: Policies for the Future Internet, Ghent, Belgium, March 25-27.","DOI":"10.1007\/978-1-4471-4763-3_4"},{"key":"key2022030920451741000_b21","unstructured":"Johnston, L.\n                and \n                  Shearing, C.\n                (2003), The Governance of Security, Routledge, London."},{"key":"key2022030920451741000_b22","doi-asserted-by":"crossref","unstructured":"Jones, T.\n                and \n                  Newburn, T.\n                (2002), \u201cThe transformation of policing? Understanding current trends in policing systems\u201d, British Journal of Criminology, Vol. 42 No. 1, pp. 129-146.","DOI":"10.1093\/bjc\/42.1.129"},{"key":"key2022030920451741000_b23","unstructured":"Kline, P.\n                (1999), The Handbook of Psychological Testing, 2nd ed., Routledge, London."},{"key":"key2022030920451741000_b24","unstructured":"Kruskal, J.B.\n                and \n                  Wish, M.\n                (1978), Multidimensional Scaling, Sage University Paper Series on Quantitative Applications in the Social Sciences, Sage, London."},{"key":"key2022030920451741000_b25","unstructured":"Levi, M.\n                (2010), \u201cPublic and private policing of financial crimes: the struggle for co-ordination\u201d, Journal of Criminal Justice and Security, Vol. 12 No. 4, pp. 343-357."},{"key":"key2022030920451741000_b26","unstructured":"Levi, M.\n                and \n                  Williams, M.\n                (2012), Cybercrime Reduction Partnership Mapping Study, NominetTtrust, Cardiff, available at: www.cardiff.ac.uk\/socsi\/resources\/Levi%20Williams%20cybercrime%20Reduction%20Partnership%20Mapping%20Study.pdf."},{"key":"key2022030920451741000_b27","doi-asserted-by":"crossref","unstructured":"Mills, A.\n               , \n                  Meek, R.\n                and \n                  Gojkovic, D.\n                (2011), \u201cExploring the relationship between the voluntary sector and the state in criminal justice\u201d, Voluntary Sector Review, Vol. 2 No. 2, pp. 193-211.","DOI":"10.1332\/204080511X583850"},{"key":"key2022030920451741000_b28","unstructured":"Naurin, D.\n                and \n                  Lindahl, R.\n                (2007), \u201cNetwork capital and cooperation patterns in the working groups of the council of the EU\u201d, European University Institute Working Paper, RSCAS, Florence."},{"key":"key2022030920451741000_b29","unstructured":"Nhan, J.\n                and \n                  Huey, L.\n                (2008), \u201cPolicing through nodes, clusters and bandwidth: the role of network relations in the prevention of and response to cybercrimes\u201d, in \n                  Leman-Langlois, S.\n                (Ed.), Technocrime: Technology, Crime and Social Control, Willan, Cullompton, pp. 66-87."},{"key":"key2022030920451741000_b30","unstructured":"PwC\n                (2013), Information Security Breaches Survey 2013: Technical Report, Price Waterhouse Coopers, London."},{"key":"key2022030920451741000_b31","doi-asserted-by":"crossref","unstructured":"Salfati, C.G.\n                (2000), \u201cThe nature of expressiveness and instrumentality in homicide\u201d, Homicide Studies, Vol. 4 No. 3, pp. 265-293.","DOI":"10.1177\/1088767900004003004"},{"key":"key2022030920451741000_b32","doi-asserted-by":"crossref","unstructured":"Santtila, P.\n               , \n                  Hakkanen, H.\n               , \n                  Alison, L.\n                and \n                  Whyte, C.\n                (2003), \u201cJuvenile firesetters: crime scene actions and offender characteristics\u201d, Legal and Criminological Psychology, Vol. 8, pp. 1-20.","DOI":"10.1348\/135532503762871200"},{"key":"key2022030920451741000_b33","doi-asserted-by":"crossref","unstructured":"Sulek, D.\n                and \n                  Doscher, M.\n                (2011), \u201cBeyond public-private partnerships\u201d, in \n                  Andreasson, K.\n                (Ed.), Cybersecurity: Public Sector Threats and Responses, CRC Press, Boca Raton, FL, pp. 127-145.","DOI":"10.1201\/b11363-12"},{"key":"key2022030920451741000_b34","unstructured":"Symantec\n                (2013), Internet Security Threat Report 2013, Vol. 18, Symantec, Mountain View, CA."},{"key":"key2022030920451741000_b35","unstructured":"Tabachnick, B.G.\n                and \n                  Fidell, L.S.\n                (2013), Using Multivariate Statistics, 6th ed., Allyn & Bacon, Boston, MA."},{"key":"key2022030920451741000_b36","doi-asserted-by":"crossref","unstructured":"Wall, D.S.\n                (2007), \u201cPolicing cybercrimes: situating the public police in networks of security within cyberspace\u201d, Police Practice and Research, Vol. 8 No. 2, pp. 183-205.","DOI":"10.1080\/15614260701377729"},{"key":"key2022030920451741000_b37","doi-asserted-by":"crossref","unstructured":"Wall, D.S.\n                and \n                  Williams, M.\n                (2007), \u201cPolicing diversity in the digital age: maintaining order in virtual communities\u201d, Criminology and Criminal Justice, Vol. 7 No. 4, pp. 391-415.","DOI":"10.1177\/1748895807082064"},{"key":"key2022030920451741000_b38","doi-asserted-by":"crossref","unstructured":"White, A.\n                and \n                  Gill, M.\n                (2013), \u201cThe transformation of policing: from ratios to rationalities\u201d, British Journal of Criminology, Vol. 53 No. 1, pp. 74-93.","DOI":"10.1093\/bjc\/azs049"},{"key":"key2022030920451741000_b39","doi-asserted-by":"crossref","unstructured":"Williams, J.\n                (2005), \u201cReflections on the private versus public policing of economic crime\u201d, British Journal of Criminology, Vol. 45 No. 3, pp. 316-339.","DOI":"10.1093\/bjc\/azh083"},{"key":"key2022030920451741000_b40","doi-asserted-by":"crossref","unstructured":"Williams, M.\n                and \n                  Levi, M.\n                (2012), \u201cPerceptions of the cybercrime controllers: modelling the influence of cooperation and data source factors\u201d, Security Journal, December.","DOI":"10.1057\/sj.2012.47"},{"key":"key2022030920451741000_frd1","unstructured":"Fick, J.\n                (2009), \u201cCybercrime in South Africa: investigating and prosecuting cybercrime and the benefits of public-private partnerships\u201d, paper presented at Council of Europe Octopus Interface Conference Cooperation Against Cybercrime, Strasbourg, France, March 10-11."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IMCS-04-2013-0027","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMCS-04-2013-0027\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMCS-04-2013-0027\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:50:45Z","timestamp":1753393845000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/21\/5\/420-443\/186040"}},"subtitle":["Mapping the UK information assurance network cooperation space"],"short-title":[],"issued":{"date-parts":[[2013,11,25]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2013,11,25]]}},"alternative-id":["10.1108\/IMCS-04-2013-0027"],"URL":"https:\/\/doi.org\/10.1108\/imcs-04-2013-0027","relation":{},"ISSN":["0968-5227"],"issn-type":[{"value":"0968-5227","type":"print"}],"subject":[],"published":{"date-parts":[[2013,11,25]]}}}